Can you expand on this wild claim? The whole point of containers is isolation so what you are saying is that containers fail at that all the time?
Comment on Security and docker
Lemongrab@lemmy.one 5 months ago
Idk how to decide what is safe or not, but as a warning, Docker containers can escape trivially and have access to the kernel.
verstra@programming.dev 5 months ago
asap@lemmy.world 5 months ago
They might be talking about posts like this (which I would love to have refuted, as this kind of info has so far kept me from using Docker significantly):
ancoraunamoka@lemmy.dbzer0.com 5 months ago
There is nothing to refute, 100% correct
Lemongrab@lemmy.one 5 months ago
Docker/Podman and LXC linux containers share the same kernel with the host machine. Root in the container is root period. With a exploit to escape the container (which are common) the malicious program has root on the machine. This is a known attack vector against linux containers. VMs are much better for isolating untrusted software from the host OS.
just_another_person@lemmy.world 5 months ago
This is not true. Perhaps on an already at-risk or exploitable machine, but even then it’s not trivial, and this is not a widespread thing that happens everywhere all the time
kevincox@lemmy.ml 5 months ago
It is. Privilege escalation vulnerabilities are common. There is basically a 100% chance of unpatched container escapes in the Linux kernel. Some of these are very likely privately known and available for sale. So even if you are fully patched a resourceful attacker will escape the container.
That being said if you are a low-value regular-joe patching regularly, the risk is relatively low.